1 |
Syed, A., Gul, N., Khan, H. H., Danish, M., Haq, S., Sarwar, B., Azhar, U., & Ahmed, W. (2021). The Impact of Knowledge Management Processes on Knowledge Sharing Attitude: The Role of Subjective Norms. The Journal of Asian Finance, Economics, and Business, 8(1), 1017-1030. https://doi.org/10.13106/jafeb.2021.vol8.no1.1017
DOI
|
2 |
Zippel, K. S. (2006). The politics of sexual harassment: A comparative study of the United States, the European Union, and Germany. Cambridge University Press.
|
3 |
Turnbull, A. (2016). An Analysis of the Organizational Structure of Redstone Test Centers Environmental and Components Test Directorate With Regard to Instrumentation Design Capabilities. https://apps.dtic.mil/sti/citations/AD1030102
|
4 |
Umrani, W. A., Kura, K. M., & Ahmed, U. (2018). Corporate entrepreneurship and business performance. PSU Research Review. https://doi.org/10.1108/PRR-12-2016-0011
DOI
|
5 |
Ferris, D. L., Chen, M., & Lim, S. (2017). Comparing and contrasting workplace ostracism and incivility. Annual Review of Organizational Psychology and Organizational Behavior, 4, 315-338.
DOI
|
6 |
Herath, T., & Rao, H. R. (2009). Protection motivation and deterrence: a framework for security policy compliance in organisations. European Journal of Information Systems, 18(2), 106-125. https://doi.org/10.1057/ejis.2009.6
DOI
|
7 |
Vance, A., Siponen, M., & Pahnila, S. (2012). Motivating IS security compliance: insights from habit and protection motivation theory. Information & Management, 49(3-4), 190-198. https://doi.org/10.1016/j.im.2012.04.002
DOI
|
8 |
Wu, D. (2020). Empirical study of knowledge withholding in cyberspace: Integrating protection motivation theory and theory of reasoned behavior. Computers in Human Behavior, 105, 106229. https://doi.org/10.1016/j.chb.2019.106229
DOI
|
9 |
Leather, P., Lawrence, C., Beale, D., Cox, T., & Dickson, R. (1998). Exposure to occupational violence and the buffering effects of intra-oranizational support. Work & Stress, 12(2), 161-178. https://doi.org/10.1080/02678379808256857
DOI
|
10 |
Sarstedt, M., Ringle, C. M., Smith, D., Reams, R., & Hair Jr, J. F. (2014). Partial least squares structural equation modeling (PLS-SEM): A useful tool for family business researchers. Journal of Family Business Strategy, 5(1), 105-115. https://doi.org/10.1016/j.jfbs.2014.01.002
DOI
|
11 |
Vijayasiri, G. (2008). Reporting sexual harassment: The importance of organizational culture and trust. Gender Issues, 25(1), 43-61. https://doi.org/10.1007/s12147-008-9049-5
DOI
|
12 |
Wright, C. V., & Fitzgerald, L. F. (2007). Angry and afraid: Women's appraisal of sexual harassment during litigation. Psychology of Women Quarterly, 31(1), 73-84. https://doi.org/10.1111/j.1471-6402.2007.00332.x
DOI
|
13 |
Hair, J. F., Risher, J. J., Sarstedt, M., & Ringle, C. M. (2019). When to use and how to report the results of PLS-SEM. European Business Review. https://doi.org/10.1108/EBR-11-2018-0203
DOI
|
14 |
Zhang, X., Han, X., Dang, Y., Meng, F., Guo, X., & Lin, J. (2017). User acceptance of mobile health services from users' perspectives: The role of self-efficacy and response-efficacy in technology acceptance. Informatics for Health and Social Care, 42(2), 194-206. https://doi.org/10.1080/17538157.2016.1200053
DOI
|
15 |
Scott, M. (2014). The Reasoning Criminal: Rational Choice Perspectives on Offending (1st ed.). London: Routledge. https://doi.org/10.4324/9781315134482
|
16 |
Schnoll, R. A., Calvin, J., Malstrom, M., Rothman, R. L., Wang, H., Babb, J., Miller, S. M., Ridge, J. A., Movsas, B., & Langer, C. (2003). Longitudinal predictors of continued tobacco use among patients diagnosed with cancer. Annals of Behavioral Medicine, 25(3), 214-221. https://doi.org/10.1207/S15324796ABM2503_07
DOI
|
17 |
Shiffman, S., Gwaltney, C. J., Balabanis, M. H., Liu, K. S., Paty, J. A., Kassel, J. D., Hickcox, M., & Gnys, M. (2009). Immediate antecedents of cigarette smoking: An analysis from ecological momentary assessment. In: G. A. Marlatt & K. Witkiewitz (Eds.), Addictive behaviors: New readings on etiology, prevention, and treatment (pp. 367-399). American Psychological Association. https://doi.org/10.1037/11855-015
|
18 |
Sinclair, R. R., Martin, J. E., & Croll, L. W. (2002). A threat-appraisal perspective on employees' fears about antisocial workplace behavior. Journal of Occupational Health Psychology, 7(1), 37. https://doi.org/10.1037/1076-8998.7.1.37
DOI
|
19 |
Witte, K. (1996). Predicting risk behaviors: Development and validation of a diagnostic scale. Journal of Health Communication, 1(4), 317-342. https://doi.org/10.1080/108107396127988
DOI
|
20 |
Woon, I., Tan, G., & Low, R. (2005). A Protection Motivation Theory Approach to Home Wireless Security. ICIS. https://aisel.aisnet.org/icis2005/31
|
21 |
Feldblum, C. R., & Lipnic, V. A. (2016). Select task force on the study of harassment in the workplace. Washington: US Equal Employment Opportunity Commission. https://www.kutakrock.com/files/Uploads/Images/KCCLE2018_Washkuhn_Handouts.pdf
|
22 |
Lee, J. (2018). Passive leadership and sexual harassment. Personnel Review. https://doi.org/10.1108/PR-07-2016-0169
DOI
|
23 |
Medlin, J. A. (2012). Domestic violence and working women: The relationship between employment status and women who seek assistance. Capella University. https://search.proquest.com/dissertations-theses/domestic-violence-working-women-relationship/docview/1033334620/se-2?accountid=135034
|
24 |
Choi, Y. (2020). A study of role of perceived organizational support among sexual harassment and employees' attitudes. The Journal of Asian Finance, Economics, and Business, 7(2), 229-236. https://doi.org/10.13106/jafeb.2020.vol7.no2.229
DOI
|
25 |
Cornish, D. B., & Clarke, R. V. (2014). The reasoning criminal: Rational choice perspectives on offending. Routledge.
|
26 |
Das, A. (2009). Sexual harassment at work in the United States. Archives of Sexual Behavior, 38(6), 909-921. https://doi.org/10.1007/s10508-008-9354-9
DOI
|
27 |
Durkin, S., Brennan, E., & Wakefield, M. (2012). Mass media campaigns to promote smoking cessation among adults: an integrative review. Tobacco Control, 21(2), 127-138. http://dx.doi.org/10.1136/tobaccocontrol-2011-050345
DOI
|
28 |
Ehrenreich, R. (1999). Dignity and discrimination: Toward a pluralistic understanding of workplace harassment. Geo. LJ, 88, 1. https://heinonline.org/HOL/LandingPage?handle=hein.journals/glj88&div=12&id=&page=
|
29 |
Floyd, D. L., Prentice-Dunn, S., & Rogers, R. W. (2000). A meta-analysis of research on protection motivation theory. Journal of Applied Social Psychology, 30(2), 407-429. https://doi.org/10.1111/j.1559-1816.2000.tb02323.x
DOI
|
30 |
Ramsaroop, A., & Parumasur, S. B. (2007). The prevalence and nature of sexual harassment in the workplace: A model for early identification and effective management thereof. SA Journal of Industrial Psychology, 33(2), 25-33. https://sajip.co.za/index.php/sajip/article/view/374/0
|
31 |
Hair, J. F., & Ringle, C. M. (2011). CM, & Sarstedt, M.(2011). PLS-SEM: Indeed a silver bullet. Journal of Marketing Theory and Practice, 19(2), 139-151.
DOI
|
32 |
Gale, S., Mordukhovich, I., Newlan, S., & McNeely, E. (2019). The impact of workplace harassment on health in a working cohort. Frontiers in Psychology, 10, 1181. https://doi.org/10.3389/fpsyg.2019.01181
DOI
|
33 |
Hair, J. F., Black, W. C., Babin, B. J., Anderson, R. E., & Tatham, R. (2006). Multivariate data analysis. Upper Saddle River, NJ: Pearson Prentice Hall.
|
34 |
Hair, J. F., , Miller, K.E., Bush, R. P., Ortinau, D. J., Roberts, K., & Lukas, S.-L.. (2014). Marketing research (4th ed.). New York: McGraw-Hill Education
|
35 |
Anderson, C. L., & Agarwal, R. (2010). Practising safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS Quarterly, 613-643. https://doi.org/https://doi.org/10.2307/25750694
DOI
|
36 |
Slovic, P., Fischhoff, B., & Lichtenstein, S. (1980). Facts and fears: Understanding perceived risk. In: Societal risk assessment (pp. 181-216). Springer. https://doi.org/10.1007/978-1-4899-0445-4_9
|
37 |
Sperry, J. M., & Nicki, R. M. (1991). Cognitive appraisal, self-efficacy, and cigarette smoking behavior. Addictive Behaviors, 16(6), 381-388. https://doi.org/10.1016/0306-4603(91)90046-K
DOI
|
38 |
Tabachnick, B. G., Fidell, L. S., & Ullman, J. B. (2007). Using multivariate statistics (Vol. 5). Boston, MA: Pearson.
|
39 |
Rasool, S. F., Wang, M., Zhang, Y., & Samma, M. (2020). Sustainable work performance: the roles of workplace violence and occupational stress. International Journal of Environmental Research and Public Health, 17(3), 912. https://doi.org/10.3390/ijerph17030912
DOI
|
40 |
Rogers, K. -A., & Kelloway, E. K. (1997). Violence at work: personal and organizational outcomes. Journal of Occupational Health Psychology, 2(1), 63. https://doi.org/10.1037/1076-8998.2.1.63
DOI
|
41 |
Hair, J. F., Ringle, C. M., & Sarstedt, M. (2013). Partial least squares structural equation modeling: Rigorous applications, better results and higher acceptance. Long Range Planning, 46(1-2), 1-12. https://ssrn.com/abstract=2233795
DOI
|
42 |
Hair, J. F., & Sarstedt, M. (2019). Factors versus composites: guidelines for choosing the right structural equation modeling method. Project Management Journal, 50(6), 619-624. https://doi.org/10.1177/8756972819882132
DOI
|
43 |
Kim, Y. J., & Kim, J. (2020). Does negative feedback benefit (or harm) recipient creativity? The role of the direction of feedback flow. Academy of Management Journal, 63(2), 584-612. https://doi.org/10.5465/amj.2016.1196
DOI
|
44 |
Jocoy, C. L., & DiBiase, D. (2006). Plagiarism by adult learners online: A case study in detection and remediation. The International Review of Research in Open and Distributed Learning, 7(1). https://doi.org/10.19173/irrodl.v7i1.242
DOI
|
45 |
Kaljee, L. M., Genberg, B., Riel, R., Cole, M., Tho, L. H., Thoa, L. T. K., Stanton, B., Li, X., & Minh, T. T. (2005). Effectiveness of a theory-based risk reduction HIV prevention program for rural Vietnamese adolescents. AIDS Education & Prevention, 17(3), 185-199. https://doi.org/10.1521/aeap.17.4.185.66534
DOI
|
46 |
Khan, G., Naveed, R. T., & Jantan, A. H. B. (2018). Status of wonder women: Challenges for young future women entrepreneurs in Pakistan. International Journal of Experiential Learning & Case Studies, 3(1), 97-109. http://dx.doi.org/10.22555/ijelcs.v3i1.1838
DOI
|
47 |
Aube, C., Brunelle, E., & Rousseau, V. (2014). Flow experience and team performance: The role of team goal commitment and information exchange. Motivation and Emotion, 38(1), 120-130. htpps://10.1007/s11031-013-9365-2
DOI
|
48 |
Boss, S. R., Galletta, D. F., Lowry, P. B., Moody, G. D., & Polak, P. (2015). What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS quarterly, 39(4), 837-864. https://www.jstor.org/stable/26628654
DOI
|
49 |
Borrelli, B., Hogan, J. W., Bock, B., Pinto, B., Roberts, M., & Marcus, B. (2002). Predictors of quitting and dropout among women in a clinic-based smoking cessation program. Psychology of Addictive Behaviors, 16(1), 22. https://doi.org/10.1037/0893-164X.16.1.22
DOI
|
50 |
Anjum, R., Khan, H. H., Bano, S., Nazir, S., Gulraiz, H., & Ahmed, W. (2021). A Latent Factor (PLS-SEM) Approach: Assessing the Determinants of Effective Knowledge Transfer. The Journal of Asian Finance, Economics, and Business, 8(2), 851-860. https://doi.org/10.13106/jafeb.2021.vol8.no2.0851
DOI
|
51 |
Bandura, A. (1982). Self-efficacy mechanism in human agency. American Psychologist, 37(2), 122. https://doi.org/10.1037/0003-066X.37.2.122
DOI
|
52 |
Barling, J., Dupre, K. E., & Kelloway, E. K. (2009). Predicting workplace aggression and violence. Annual Review of Psychology, 60, 671-692. https://doi.org/10.1146/annurev.psych.60.110707.163629
DOI
|
53 |
Bilal, M. A., Khan, H. H., Irfan, M., Haq, S., Ali, M., Kakar, A., Ahmed, W., & Rauf, A. (2021). Influence of Financial Literacy and Educational Skills on Entrepreneurial Intent: Empirical Evidence from Young Entrepreneurs of Pakistan. The Journal of Asian Finance, Economics, and Business, 8(1), 697-710. https://doi.org/10.13106/jafeb.2021.vol8.no1.697
DOI
|
54 |
Burke, R. J. (2018). Reducing sexual harassment at workplace. Effective Executive, 21(2), 51-56.
|
55 |
Chin, W. W. (2010). How to write up and report PLS analyses. In: Handbook of partial least squares (pp. 655-690). Springer. https://doi.org/10.1007/978-3-540-32827-8_29
|
56 |
Krieger, N., Waterman, P. D., Hartman, C., Bates, L. M., Stoddard, A. M., Quinn, M. M., Sorensen, G., & Barbeau, E. M. (2006). Social hazards on the job: workplace abuse, sexual harassment, and racial discrimination-a study of black, Latino, and white low-income women and men workers in the United States. International Journal of Health Services, 36(1), 51-85. https://doi.org/10.2190/3EMB-YKRH-EDJ2-0H19
DOI
|
57 |
Li, R., Cooper, C., Barber, J., Rapaport, P., Griffin, M., & Livingston, G. (2014). Coping strategies as mediators of the effect of the START (strategies for RelaTives) intervention on psychological morbidity for family carers of people with dementia in a randomised controlled trial. Journal of Affective Disorders, 168, 298-305. https://doi.org/10.1016/j.jad.2014.07.008
DOI
|
58 |
Maddux, J. E., & Rogers, R. W. (1983). Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of Experimental Social Psychology, 19(5), 469-479. https://doi.org/10.1016/0022-1031(83)90023-9
DOI
|
59 |
McDonald, L., Hitzig, S. L., Pillemer, K. A., Lachs, M. S., Beaulieu, M., Brownell, P., Burnes, D., Caspi, E., Mont, J. D., & Gadsby, R. (2015). Developing a research agenda on resident-to-resident aggression: recommendations from a consensus conference. Journal of Elder Abuse & Neglect, 27(2), 146-167. https://doi.org/10.1080/08946566.2014.995869
DOI
|
60 |
Milne, S., Sheeran, P., & Orbell, S. (2000). Prediction and intervention in health-related behavior: A meta-analytic review of protection motivation theory. Journal of Applied Social Psychology, 30(1), 106-143. https://doi.org/10.1111/j.1559-1816.2000.tb02308.x
DOI
|
61 |
Fornell, C., & Larcker, D. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39-50. https://doi.org/10.1177/002224378101800104
DOI
|
62 |
Chiaburu, D. S., Peng, A. C., Oh, I.-S., Banks, G. C., & Lomeli, L. C. (2013). Antecedents and consequences of employee organizational cynicism: A meta-analysis. Journal of Vocational Behavior, 83(2), 181-197. https://doi.org/10.1016/j.jvb.2013.03.007
DOI
|
63 |
Mwagwabi, F. (2015). A Protection Motivation Theory approach to improving compliance with password guidelines. Murdoch University. http://researchrepository.murdoch.edu.au/id/eprint/27070
|
64 |
Naveed, A., & Alwani, N. (2010). Sexual harassment at work place: are you safe? Journal of Ayub Medical College, 22(3), 222.
|
65 |
Norman, P., Boer, H., & Seydel, E. R. (2005). Protection motivation theory. In: M. Conner, & P. Norman (Eds.), Predicting Health Behaviour: Research and Practice with Social Cognition Models (pp. 81-126). Open University Press.
|
66 |
Chin, W. W. (1998). The partial least squares approach to structural equation modeling. Modern Methods for Business Research, 295(2), 295-336.
|
67 |
Henseler, J., Ringle, C. M., & Sinkovics, R. R. (2009). The use of partial least squares path modeling in international marketing. In: New challenges to international marketing (pp. 277-319). Emerald Group Publishing Limited.
|
68 |
Jenkins, J., Durcikova, A., & Burns, M. (2012). Forget the Fluff: Examining How Media Richness Influences the Impact of Information Security Training on Secure Behavior. 2012 45th Hawaii International Conference on System Sciences, 3288-3296.
|
69 |
Jenkins, J. L., Grimes, M., Proudfoot, J. G., & Lowry, P. B. (2014). Improving password cybersecurity through inexpensive and minimally invasive means: Detecting and deterring password reuse through keystroke-dynamics monitoring and just-in-time fear appeals. Information Technology for Development, 20(2), 196-213. https://doi.org/10.1080/02681102.2013.814040
DOI
|
70 |
Lichtenstein, E., Glasgow, R. E., & Abrams, D. B. (1986). Social support in smoking cessation: In search of effective interventions. Behavior Therapy, 17(5), 607-619. https://doi.org/10.1016/S0005-7894(86)80098-3
DOI
|
71 |
Rogers, R. W. (1975). A protection motivation theory of fear appeals and attitude change1. The Journal of Psychology, 91(1), 93-114. https://doi.org/10.1080/00223980.1975.9915803
DOI
|
72 |
Pai, H. C., & Lee, S. (2011). Risk factors for workplace violence in clinical registered nurses in Taiwan. Journal of Clinical Nursing, 20(9-10), 1405-1412. https://doi.org/10.1111/j.1365-2702.2010.03650.x
DOI
|
73 |
Putri, F. F., & Hovav, A. (2014). Employees' Compliance with BYOD Security Policy: Insights from Reactance, Organizational Justice, and Protection Motivation Theory. ECIS.
|
74 |
Potter, R., O'Keeffe, V., Leka, S., Webber, M., & Dollard, M. (2019). Analytical review of the Australian policy context for work-related psychological health and psychosocial risks. Safety Science, 111, 37-48. https://doi.org/10.1016/j.ssci.2018.09.012
DOI
|